• A novel agent-based framework in bridge-mode hypervisors of cloud security

      Yan, W-Q (Springer Berlin Heidelberg, 2012)
      Cloud computing has been introduced as a tool for improving IT proficiency and business responsiveness for organizations as it delivers flexible hardware and software services as well as providing an array of fundamentally ...
    • An empirical approach for currency identification

      Yan, W-Q; Chambers, J; Garhwal, A (Springer, 2013)
      Currency identification is the application of systematic methods to determine authenticity of questioned currency. However, identification analysis is a difficult task requiring specially trained examiners, the most important ...
    • Chemometrics and Hyperspectral Imaging Applied to Assessment of Chemical, Textural and Structural Characteristics of Meat

      Reis, M; Al-Sarayreh,, M; Yan, W-Q; Klette, R (Elsevier, 2018)
      Spectroscopy in the visible near-infrared spectral (Vis-NIRS) range combined with imaging techniques (hyperspectral imaging, HSI) allows assessment of chemical composition, texture, and meat structure. The use of HSI in ...
    • Content Based Authentication of Visual Cryptography

      Wang, G; Yan, W-Q; Kankanhalli, M (Springer, 2016)
      Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of ...
    • Currency security and forensics: a survey

      J. Chambers; Yan, W-Q; Garhwal, A; Kankanhalli, M (Springer, 2013)
      By its definition, the word currency refers to an agreed medium for exchange, a nation’s currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: ...
    • CVSS: A Cloud Based Visual Surveillance System

      Yan, W-Q; Yu, J; Shu, Y; Zhou, L (IGI Global, 2018)
      A large amount of surveillance videos and images need sufficient storage. In this article, an architecture of cloud-based surveillance systems and its modules will be designed, the Cloud-based Visual Surveillance System ...
    • Detection of Adulteration in Red Meat Species Using Hyperspectral Imaging

      Al-Sarayreh, M; Reis, M; Yan, W-Q; Klette, R (Springer, 2017)
      This paper reports the performance of hyperspectral imaging for detecting the adulteration in red-meat species. Line-scanning images are acquired from muscles of lamb, beef, or pork. We consider the states of fresh, frozen, ...
    • An Empirical Study for Human Behavior Analysis

      Lu, J; Shen, J; Yan, W-Q; Bacic, B (IGI Global, 2017)
      This paper presents an empirical study for human behavior analysis based on three distinct feature extraction techniques: Histograms of Oriented Gradients (HOG), Local Binary Pattern (LBP) and Scale Invariant Local Ternary ...
    • ESSVCS: an enriched secret sharing visual cryptography

      Liu, F; Yan, W-Q; Li, P; Wu, C (Springer, 2013)
      Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to be ...
    • Event analogy for privacy preservation in visual surveillance

      Yan, W-Q; Liu, F (Springer, 2015)
      Privacy preservation as a thorny problem in surveillance has been arisen because of its relevance to human right, however it has not been completely solved yet today. In this paper, we investigate this existing problem ...
    • Face search in encrypted domain

      Yan, W-Q; Kankanhalli, M (Springer, 2015)
      Visual information of images and videos usually is encrypted for the purposes of security applications. Straightforward manipulations on the encrypted data without requiring any decryption have the advantage of speed over ...
    • Gradient Coils Design with Regularization Method for Superconducting Magnetic Resonance Imaging

      Zheng, S; Li, X; Yan, W-Q; Xu, W (IEEE, 2018)
      This paper proposes an approach to the design of gradient coils for superconducting magnetic resonance imaging (MRI). The designed method takes use of Fourier series expansions to describe the continuous current density ...
    • Local Fast R-CNN Flow for Object-centric Event Recognition in Complex Traffic Scenes

      Gu, Q; Yang, J; Yan, W-Q; Li, Y; Klette, R (Springer, 2017)
      This paper presents a solution for an integrated object-centric event recognition problem for intelligent traffic supervision. We propose a novel event-recognition framework using deep local flow in a fast regionbased ...
    • A Personalised Stereoscopic 3D Gallery with Virtual Reality Technology on Smartphone

      Tran, H; Nguyen, M; Le, H; Yan, W-Q (IEEE, 2017)
      Virtual reality (VR) is becoming more and more popular thanks to the recent advance of smartphones and low-cost VR headsets. In this article; we propose an online system that creates a stereoscopic 3D gallery for individual ...
    • The State-of-the-art Technology of Currency Identification: A Comparative Study

      Wang, G; Wu, X; Yan, W-Q (IGI Global, 2017)
      The security issue of currency has attracted awareness from the public. Despite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them ...
    • A Tile-based Color Picture With Hidden QR Code for Augmented Reality and Beyond

      Tran, H; Le, H; Nguyen, M; Yan, W-Q (Association for Computing Machinery (ACM), 2017)
      Most existing Augmented Reality (AR) applications use either template (picture) markers or bar-code markers to overlay computergenerated graphics on the real world surfaces. e use of template markers is computationally ...
    • Towards Musicologist-driven Mining of Handwritten

      Niitsuma, M; Yan, W-Q; Tomita, Y; Bell, D (Institute of Electrical and Electronics Engineers, 2017)
      Historical musicologists have been seeking for objective and powerful techniques to collect, analyse and verify their findings for many decades. The aim of this study was to show the importance of such domain-specific ...